Stack-based buffer overflow vulnerability exists in orcparse.c of ORC versions prior to 0.4.39. If a developer is tricked to process a specially crafted file with the affected ORC compiler, an arbitrary code may be executed on the developer's build environment. This may lead to compromise of developer machines or CI build environments.
References
Link | Resource |
---|---|
http://www.openwall.com/lists/oss-security/2024/07/26/1 | Third Party Advisory |
https://github.com/GStreamer/orc | Product |
https://gstreamer.freedesktop.org/modules/orc.html | Product |
https://jvn.jp/en/jp/JVN02030803/ | Third Party Advisory |
http://www.openwall.com/lists/oss-security/2024/07/26/1 | Third Party Advisory |
https://github.com/GStreamer/orc | Product |
https://gstreamer.freedesktop.org/modules/orc.html | Product |
https://jvn.jp/en/jp/JVN02030803/ | Third Party Advisory |
Configurations
History
No history.
Information
Published : 2024-07-26 06:15
Updated : 2024-11-21 09:31
NVD link : CVE-2024-40897
Mitre link : CVE-2024-40897
CVE.ORG link : CVE-2024-40897
JSON object : View
Products Affected
gstreamer
- orc